/ Most Viewed

Call for Participation - DNSSEC Workshop at ICANN 59 in Johannesburg

Do you have ideas about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Johannesburg, South Africa, for ICANN 59 in June 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 59 DNSSEC Workshop! more

A Sigh of Relief for Brand Owners ...Not So .Fast

All indications from the ICANN meetings in Seoul are that significant delays for the release of new gTLDs (Generic Top Level Domains) are expected. According to Rod Beckstrom, ICANN's CEO, new gTLDs will be made available when, "we've adequately addressed the important issues that are on the table." These important issues include efforts to address malicious conduct, root scaling, economic analysis, trademark protections, and vertical separation as related to the new gTLDs. more

Google’s Loon Announces First Commercial Deal With Telkom Kenya to Provide Internet-by-Balloon

Google's sister-company Loon has announced its first commercial agreement with Telkom Kenya in order to deliver connectivity to the region using a network of giant balloons. more

Cuba Reaches Five Million Mobile Accounts

Cubans now have 5 million mobile accounts. The five-millionth account was recently opened Guanabacoa, in the eastern part of Havana and we see here that growth slowed last year, but has resumed -- perhaps due to increased 3G availability. Most Cubans have 2G phones, which are used primarily for making calls and sending text messages that may have attached images. more

One Third of Companies Employing Staff to Monitor Content of Outbound Email, According to Survey

A recent survey of US companies conducted by Proofpoint has found companies increasingly concerned over data leaks via emplyee misuse of email, blogs, social networks, multimedia channels and text messages. From the report: "[A]s more US companies reported their business was impacted by the exposure of sensitive or embarrassing information (34 percent, up from 23 percent in 2008), an increasing number say they employ staff to read or otherwise analyze the contents of outbound email (38 percent, up from 29 percent in 2008). The pain of data leakage has become so acute in 2009 that more US companies report they employ staff whose primary or exclusive job is to monitor the content of outbound email (33 percent, up from 15 percent in 2008)." more

Part 2: Let’s Have an Honest Conversation About Huawei

In the first section of this piece, I argued that the anti-Huawei litany only makes sense when one realizes that it is the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith, and any Chinese firm can be ordered to do the government's will without any legal, political, or economic checks and balances. more

Agriculture At High-Speed: Project Updates on Bridging California’s Rural/Urban Digital Divide

When farms are connected to the Internet, we all benefit. Agriculture that gains real-time information about plants, soil, atmosphere, and irrigation, dubbed "precision agriculture", can save farmers 20-30% of their water consumption while increasing productivity by 20-70%, according to Valley Vision. The San Francisco-Bay Area Internet Society Chapter is pleased to announce that we have started phase one of our collaborative project, "Bridging California's Rural/Urban Digital Divide with Mobile Broadband"... more

From Telegraph (1914) to Twitter (2014) - Are There Lessons to Be Learned?

Could the Great War have been avoided if leaders had gotten together and negotiated in person instead of exchanging telegrams? In the voluminous historiography of the origins of WWI, there is a very little on the role of the telegraph. Today, as Twitter takes its place conference rooms, we can learn a lot from the failure of telegraph diplomacy one century ago... The telegraph introduced the notion of 'virtual presence'; for the first time in human history, communication was detached from transportation. more

Neustar Acquires Bombora Technologies, the Holding Group for Ari Registry Services and AusRegistry

Neustar announces that it has acquired Bombora Technologies Pty Ltd (Bombora), based in Australia, for AUD $118.5 million, or approximately USD $86.9 million. Bombora and its subsidiaries, which include ARI Registry Services, provide registry services for a number of top-level domains (TLDs) including .au, .melbourne, .sydney, and over 100 new TLDs, including several in the Fortune 500. more

Computer Transactions, Not People, Are Driving the Need for All-Fibre Networks

Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more

ICANN’s Comment Period on Accountability Process Seeks Scope Limitations

Bowing to unprecedented community pressure in the form of a unanimous letter questioning its staff-developed Accountability Process, as well as a reconsideration request filed with the Board, on September 5th ICANN issued a notice titled "Public Comment Invited: Enhancing ICANN Accountability Process". The notice opens a 21-day public comment period on that staff proposal. However, ICANN staff apparently cannot resist asserting some form of top-down control even what that very conduct is at issue, and the notice and accompanying explanation contain attempts to restrict and unduly channel the scope of community comment. more

Outlawing Botnets

The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more

Twitter, DDoS and the Motivations Behind the Attack

As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more

Call for Participation: Registration Operations Workshop at IETF-92

The next Registration Operations Workshop will take place at the start of IETF-92 on Sunday, March 22, 2015, at The Fairmont Dallas Hotel. The workshop will start at 12:30 p.m. CDT and will finish at 4:30 p.m. CDT. We are seeking proposals for Extensible Provisioning Protocol (EPP) extensions to be featured as part of the workshop, including existing extensions that people wish to register with the Internet Assigned Numbers Authority (IANA)... more

Muzzled by the United Nations

The Internet Governance Forum is winding down today in Sharm El Sheikh, Egypt. There have been a lot of very constructive conversations in workshops and panels over the past four days about how to advance security, privacy, child protection, AND human rights and free expression on the Internet. Unfortunately, the biggest headline coming out of the forum so far has been an incident on Sunday... more